SlideShare uma empresa Scribd logo
1 de 32
Baixar para ler offline
Fraud & Abuse
Report
Key Highlights Transaction Analysis ConclusionForeword Report Overview
arkoselabs.com © 2020 1
Fraud Report
Q1 2020
Foreword
Kevin Gosschalk
CEO & Founder, Arkose Labs
As we reflect on 2019, we see some notable shifts in the threat landscape, with businesses facing new levels of complexity
in fraud orchestration. Rather than looking for the quick buck, fraudsters are playing the long game, with multi-step attacks
that do not initially reveal their fraudulent intent.
As the saying goes, ‘money makes the world go round’, and this could not be more true for the cybercrime underworld.
Fraudsters’ unrelenting demand for fresh user credentials provides the financial incentive for cyber attackers carrying out
major data breaches. When fraudsters successfully leverage the spoils from these breaches to make money, they will use
the proceeds to invest in more advanced attack toolkits and greater volumes of stolen data. As a result, organizations find it
increasingly difficult to defend against the barrage of attacks on their websites and apps.
The only sustainable approach to curbing the cybercrime cycle of success is adopting a zero-tolerance approach to fraud
prevention. Tolerating current fraud levels as a 'cost of doing business' exacerbates the problem long-term by providing the
financial incentive for fraudsters. In-depth profiling of activity across customer touchpoints helps organizations facing subtle
attacks that do not show immediate tell-tale signs of fraud. When combined with targeted friction, large-scale attacks
quickly become unsustainable for fraudsters who have become accustomed to circumnavigating systems that avoid putting
up barriers to users.
As the latest data from the Arkose Labs platform show, attack rates are continuously on the rise. Going into 2020, the fraud-
fighting community needs to finally win back the upper hand against fraudsters, protecting individuals and our society from
the effects of cybercrime.
2
Report Overview
Unsophisticated bot attacks don’t result in a user session and thus have not been included in this
report. The report focuses on attacks from fraud outlets that combine state-of-the-art technology with
stolen identity credentials and human efforts.
The attack patterns have been analyzed across parameters and closely investigate the mechanics of
inauthentic attacks as they range from automated bots to human or ‘sweatshop’ driven attacks.
These attacks focus on defrauding the businesses and their users through fraudulent account
registrations, account takeovers or payments using stolen credentials.
Arkose Labs uses a bilateral approach that combines global telemetry with a patent-pending
enforcement challenge to profile user activity in detail and act upon data in real-time. This provides
unique insights into attacker identification and classification, enabling the platform to deploy
appropriate responses and countermeasures. Suspect sessions are identified when they show
characteristics that have been classified as abusive or malicious by Arkose Labs, based on previous
activity on other customers’ digital properties.
While Arkose Labs supports multiple use cases across the customer journey, these have been
broadly grouped under account registrations, logins and payments.
The Q1 Arkose Labs Fraud and Abuse Report is based on actual user sessions and attack patterns that
were analyzed by the Arkose Labs Fraud and Abuse Prevention Platform from Oct to Dec 2019. These
sessions, spanning account registrations, logins and payments from financial services, ecommerce, travel,
social media, gaming and emerging technology were analyzed in real-time to provide insights into the
evolving fraud and risk landscape.
Key Highlights Transaction Analysis ConclusionForeword Report Overview
arkoselabs.com © 2020
Fraud Report
Q1 2020
Key Highlights ransaction Analysis ConclusionForeword Report Overview
Q1 Fraud Report Highlights
3arkoselabs.com © 2020
Fraud Report
Q1 2020
Record holiday shopping transactions
bring record fraud levels with attacks steadily increasing
throughout the quarter.
Evolving attack patterns show fraudsters
using more sophisticated tools and attempting to stay
under the radar by using rotation and randomization of
characteristics to blend in with authentic traffic.
Sweatshop-driven attacks from countries like
Venezuela, Vietnam, Thailand, India and Ukraine
continue to grow, while these attacks from the Philippines,
Russia and Ukraine have almost tripled compared to Q2
The key countries where human-driven attacks
originated from shifted again this quarter, showing
fraudsters tapping into human farms across different
locations to optimize their costs.
Attack volumes vary rapidly, with fraudsters
attacking in short bursts across the quarter, using
inconsistent timing to prevent businesses from predicting
when they will be targeted.
Automated attacks are becoming more
complex as fraudsters mimic good customer behavior
and attempt to deploy enhanced machine vision
technology to bypass challenges.
Automated attacks grew by 25% while
human-driven attacks grew by 90% compared to Q2 2019
Attacks from the Philippines and
Russia almost doubled compared to Q2.
Key Highlights Transaction Analysis ConclusionForeword Report Overview
Industry Roundup
4arkoselabs.com © 2020
Fraud Report
Q1 2020
82%increase in sweatshop
attacks for social media.
Two out of five social media logins is an attack,
with over 50% being human-driven.
New account fraud for gaming grew by
74% compared to Q2.
2X growth in holiday season traffic for
travel and retail.
2X
Attack mix for financial services shifted
dramatically with almost all account
takeover attacks coming from
automated bots.
Attack rates on logins for technology
platforms grew by 58%.
Gaming Fintech
Information TechnologyTourism
Social Media
Key Highlights ransaction Analysis ConclusionForeword Report Overview
5arkoselabs.com © 2020
Global Attack Patterns - The Race to Monetization
Fraud Report
Q1 2020
The globally connected nature of
cybercrime is evident in the rapidly
shifting attack hubs each quarter.
Improvements in technology
infrastructure coupled with availability
of cheap labor has made certain
developing economies, especially in
Southeast Asia and Latin America,
lucrative fraud hubs for cybercriminals
everywhere.
This quarter Arkose Labs saw a sharp
increase in attacks across industries
and use cases, primarily from emerging
economies like the Philippines, Russia
and Indonesia where the attack volume
nearly doubled compared to Q2 2019.
The Philippines re-emerged as the top
attacker this quarter, with every third
attack originating from there. These
attacks target digital businesses across
the globe, especially in tech, gaming
and social verticals.
1-10
Top Attack Originators
11-20
21-50
51-195
Key Highlights Transaction Analysis ConclusionForeword Report Overview
The holiday season retail extravaganza,
business-driven purchasing events and a spike
in year-end travel means digital commerce was
at its very peak last quarter. Fraudsters around
the world mobilized, looking to take advantage
of busy transaction volumes in order to launch
and disguise attacks.
This quarter saw a shift towards human-driven
attacks. These attacks grew a whopping ~90%
compared to six months prior, whereas
automated attacks grew at a rate of 25%.
The growth in human-driven fraud can be
attributed to fraudsters shifting their tactics in
response to decreasing success rates of
automated attacks, due to an increased focus
on identity proofing and corroboration across
industries. Additionally, many automated
attacks are focused on testing or validating
credentials in preparation for a more targeted
human-driven attack. These testing attacks take
place in the months preceding the holiday
season.
This quarter, attacks from the Philippines,
Russia, Indonesia, Thailand and Vietnam grew
sharply, primarily from human-driven attacks.
Top Attack Originators and their Attack Mix
Automated Human-Driven
United States
28.9%
72.1%
Philippines
54.6%
45.4%
Russia
66.9%
33.1%
Great Britain
29.3%
70.7%
Ukraine
69.9%
30.1%
6arkoselabs.com © 2020
Top Attackers Across the Globe
Fraud Report
Q1 2020
Key Highlights Transaction Analysis ConclusionForeword Report Overview
Hourly Variability for Human vs Automated Attacks
12AM 4AM 8AM 12PM 12AM8PM4PM
10%
0%
20%
30%
Percentageofhuman-drivenattacks
Time of Day
7arkoselabs.com © 2020
Attack volumes were elevated this quarter, due to the availability of fresh user data off the back of recent breaches. On top of this, there was an increase in attacks targeting a select number of key
business groups, demonstrating how fraudsters launch large-scale attacks on specific websites and apps.
Not only but they are also the fraudsters attacking in greater volume, they are also shifting attack patterns in order to maximize their returns during the busy digital commerce period. This quarter,
peak attack timings were earlier in the day compared to the previous quarter. Consumers deviate from their normal transactional habits as they participate in the early morning rush to get the best
deals during the holiday shopping season. Fraudsters will subsequently adapt their own attack timings in an attempt to blend in with spikes in legitimate traffic.
The variability of human versus automated attacks was more pronounced this quarter. Sweatshop-driven attack levels increased during the high traffic periods, with peak attack levels 50% higher
than seen in Q2 2019.
Attack Patterns Shift During Peak Commerce Season
Fraud Report
Q1 2020
Key Highlights ransaction Analysis ConclusionForeword Report Overview
8arkoselabs.com © 2020
Top Four Takeaways from the Holiday Shopping Season
Fraud Report
Q1 2020
Automated and Human Attacks
40 42 44 46 5048 52
Weeks of the year
AttackVolume
Human-DrivenAutomated
Heightened user
engagement across all use cases,
driven by promotions, deals and last-
minute shopping.
Fluctuations in
the attack mix show fraudsters
experimenting to find the optimal blend in
order to maximize return on investment.
Shift towards human-driven
attacks versus automated attacks at
the end of the period as fraudsters invest
in more targeted action.
Steady increase in
fraudulent activity with the
number of detected attacks rising notably
throughout the quarter.
Key Highlights Transaction Analysis ConclusionForeword Report Overview
9arkoselabs.com © 2020
A Strategic Approach to Maximizing Fraud Returns
Fraud Report
Q1 2020
Digital interactions are continuing to grow at a rapid pace as more and more business models, use cases and customer interactions move online and to mobile devices. One unintended
consequence of this growth has been the increase of fraud. As these transactions have grown, so had the number of attacks targeting these use cases.
What makes the situation more complex is the fact that this growth in attacks comes with increased sophistication in attack patterns. Just as businesses evolve their security stacks and defense
strategies, cybercriminals are taking an increasingly strategic approach to their activity. They experiment with the optimal attack mix, from high-velocity but low-sophistication abuse to targeted
attacks which accurately mimic real user behavior.
In the quest for the best return on investment, fraudsters use all the tools at their disposal, and attack patterns shift depending on whether they are deploying automated tools, human resources or a
hybrid of the two. Reverse engineering of anti-fraud technologies ascertains what data systems rely on to differentiate fraud from good customers. Businesses who rely solely on data-driven fraud
prevention can leave themselves vulnerable to advanced spoofing techniques and single request attacks.
NumberofAttacks
Time
AttackSophistication
High velocity, low
variation in transaction
characteristics
Sophisticated characteristic
spoofing, but some
mistakes in data
High variation in characteristics
but with unnatural pattern, low
velocity
Low velocity with sophisticated
client-side tampering
Key Highlights ransaction Analysis ConclusionForeword Report Overview
Human-Driven vs Automated Attack - By Industry
0%
Finance Gaming Social Tech Travel & Retail
25%
75%
50%
100%
Automated
Human
10arkoselabs.com © 2020
Human vs the Machine: Attack Mix by Industry
Fraud Report
Q1 2020
This quarter, nearly two in every five attacks were human-driven, representing a 33% increase
over Q2 2019. However, the attack mix shifts greatly depending on the customer touchpoint and
industry - with more human attacks when there is a higher potential of monetization.
Often automated attacks are a precursor to a sophisticated human-driven attack. The key for
fraudsters is to find the right mix of human effort and bots, and tactics will change over time as
more complex, multi-step attacks progress.
This quarter, we saw a big shift in financial services, with fraudsters shifting their attack patterns to
primarily automated, in order to test credentials for account takeover. On the other hand,
gaming, travel, retail and social continue to see a high mix of human-driven attacks,
especially for account registrations.
Understanding attacks trend is vital for effective defense. The higher cost of human-driven
attacks means that fraudsters will quickly abandon attack once it proves too difficult,
making targeted friction highly effective against large-scale attacks.
Key Highlights ransaction Analysis ConclusionForeword Report Overview
Human-Driven Attack Rates - By Use Case
12AM 4AM 8AM 12PM 4PM
20%
0%
60%
40%
8PM 12AM
PercentageofallAttack
Time of Day
LoginsRegistrations Payment
11arkoselabs.com © 2020
Changes to the Attack Mix Across Q4
Attacks during the period leading up to the holiday season were focused on validating and priming
credentials, with a heavy reliance on automated tools to carry out new account fraud.
During Q4 the focus of attacks shifted towards account takeover and payments, with elevated
rates of human-driven attacks. As digital commerce hits its busy period, many businesses adapt
their risk tolerance to let as many users through as possible. Fraudsters capitalize on this move by
trying to pass themselves off as legitimate customers, and leverage sweatshops to scale up
human-driven attacks.
Taking over a legitimate person’s account gives them instant credibility and enables them
to transact freely. This quarter, human-driven attacks on account logins went up with almost
half of the attacks coming from humans during peak volume times for both payments and
logins.
Payment transactions continue to have the highest variability during the day, especially
during peak shopping days where it's easier for fraudsters to blend in with legitimate traffic.
Fraud Report
Q1 2020
Key Highlights ransaction Analysis ConclusionForeword Report Overview
12arkoselabs.com © 2020
Fraud Report
Q1 2020
Attack Incentive Index
Disparities in wages and cost of labor,
differing costs of living and the
comparative purchasing power of
different currencies, and access to
technology shift incentive levels
among would-be fraudsters.
Using regional economic indicators
combined with Arkose Labs’ data on
known attacks, we have created an
Attack Incentive Index for countries
across the globe. The higher the
incentive, the more resources they are
likely to put behind attacks while still
preserving return on investment (ROI).
Areas with high incentive levels have
more financial motivation to become
involved in cybercrime. They will
persevere longer than average when
they meet resistance or friction, before
abandoning attacks.
Low HighMedium
Key Highlights Transaction Analysis ConclusionForeword Report Overview
13arkoselabs.com © 2020
Fraud Trends Across Customer Touchpoints
2019 was a watershed year for data breaches and its impact is seen in the growing attack rates, which grew 26% compared to Q2, primarily driven by fake account registrations, gift card fraud and
account takeover attacks.
Arkose Labs works with businesses across the customer journey, with transactions being grouped under account creation, login, and payments. Nearly three out of four digital sessions are account
logins. Account takeover attacks increased by 35% compared to Q2, underscoring the value of gaining access to users’ accounts.
A shift in tactics was evident this quarter as human-driven account takeover attacks more than doubled compared to Q2 whereas automated account registrations increased by 90%.
These attacks may seem disconnected but are a part of a complex cybercrime ecosystem. As fraudsters find it hard to launch successful account takeover attacks using automated tools, they shift
their focus to human-led attacks wherein an unsuccessful account registration attack can provide valuable insights into the existence of an account with the business, paving the way for a
sophisticated account takeover attack.
0% 5% 10% 15% 20% 25%
Payments
Account
Registrations
Logins
20.8%
22.6%
17.2%
Attack Rates by Use Case
Fraud Report
Q1 2020
Payments
2% 21.3%
76.7%
Account
Registrations
Logins
Transactions
by Use Case
Key Highlights Transaction Analysis ConclusionForeword Report Overview
14arkoselabs.com © 2020
Fraud in the World of Finance and FinTech
As the financial services industry continues to transform and fintech solutions continue to gain traction, the fraud and abuse targeting digital customers is constantly shifting.
12% of financial services logins were fraud attempts. However, the overall attack levels for this sector fell this quarter compared to the previous ones, especially for human-driven attacks. This
underscores the connected nature of global fraud and cybercrime. In a busy retail quarter, fraudsters will shift their resources and focus to maximize their financial returns.
Arkose Labs works with financial services providers and fintech operators to protect account logins and associated activities, including balance checks and account updates carried out on desktop
and mobile applications.
Fraud Report
Q1 2020
Hourly Attack Rate - Finance
12AM 4AM 8AM 12PM 4PM 8PM
0%
15%
10%
12AM
AttackRate
Time of Day
Account Takeover Attack Rate - Finance
11.9%
Attacks
Payments
2% 21.3%
76.7%
Account
Registrations
Logins
Transactions
by Use Case
Key Highlights Transaction Analysis ConclusionForeword Report Overview
arkoselabs.com © 2020
Technology Platforms Face an Array of Fraud and Abuse Tactics
Fraud attacks on technology platforms further underscore the creative ways in which fraudsters monetize stolen credentials and resources. These platforms offer solutions to both individuals and
businesses looking to leverage the convenience of communication platforms, flexible storage and office tools.
Primary use cases in this segment are account registrations and logins, with recurring payments passively funding access. These use cases are increasingly attacked by fraudsters across the globe,
and this segment experiences one of the highest levels of attacks from sweatshops.
Account takeover for content scraping and spam dissemination is emerging as a big attack vector. Technology platforms also must be vigilant and protect against bad actors misusing the account
registration for promotion abuse, credential testing and account resale.
More than half of new account registration fraud is human-driven, while login and scraping attacks are primarily automated. New account registration attacks on technology platforms grew 20%
compared to Q2 2019, while login and scraping attacks grew 50%.
15
Logins
75.1% 24.9%
Account
Registrations
Use Case
0% 5% 10% 15% 20%
Account
Registrations
Logins
19.9%
15.6%
Attack Rates by Use Case - Technology
Fraud Report
Q1 2020
Key Highlights Transaction Analysis ConclusionForeword Report Overview
arkoselabs.com © 2020
Attack Mix for Technology Platforms
Attack rates for the technology segment grew 40% this quarter compared to Q2. The human-driven attack mix declined closer to the holiday season but went up again towards the end of the year.
This speaks to how fraudsters optimize their resources to focus on the best monetization potential.
Despite the overall decline, ~40% of all registration attacks are human-driven, whereas almost all of login attacks are automated.
16
Hourly Attack Rates by Use Case- Technology
12AM 4AM 8AM 12PM 12AM8PM4PM
10%
0%
30%
20%
50%
40%
LoginsRegistrations
Time of Day
Daily Human-Driven Attack Rates - Technology
1 2 3 4
5%
0%
15%
10%
20%
Weeks of the Month
Fraud Report
Q1 2020
Key Highlights Transaction Analysis ConclusionForeword Report Overview
arkoselabs.com © 2020
Monetizing Tech Platforms - Continued Onslaught of Human Sweatshops
Abuse on technology platform registration continues from across the globe. These attacks demonstrate the knowledge-sharing between sophisticated fraudsters that sometimes rely on sweatshops
to carry out preparation activity for a larger cybercrime attack.
In the past few quarters the network has identified a series of human-driven attacks wherein fraudsters in China, U.S, India, Brazil and Russia set up fraudulent accounts to abuse promotions
offering free servicer time to mine for Bitcoin. Over the quarter, the fraudsters shifted their attack patterns and locations with different regions carrying out the attacks over time.
The amount of effort a fraudster will expend is proportional to the value they get. The high monetization potential associated with bitcoin mining justifies the elevated levels of human-driven attacks,
albeit from low-cost countries.
17
Fraud Report
Q1 2020
15 19 23 27 31 35 39 43 47 51
1000K
0K
200K
400K
600K
800K
Daily Automated vs. Human-Driven Attack Rates - Technology
Sessions
Time of Day
Automated
Human Driven
Key Highlights Transaction Analysis ConclusionForeword Report Overview
arkoselabs.com © 2020
Gaming Transaction Analysis
18
Payments
1.6%
21%
77.4%
Account
Registrations
Logins
Use Case
0% 10%5% 20%15% 25%
Payments
Account
Registrations
Logins
21.7%
22%
16.5%
Attack Rates by Use Case - Gaming
As millions of users of all ages increasingly engage in online games, the industry has expanded and has given birth to a commerce ecosystem that has become another monetization avenue for
fraudsters across the globe.
The attacks on these gaming platforms are persistent and highly sophisticated. Fraudsters use these platforms to use stolen payment methods, stealing in-game assets, abusing the auction houses
and disseminating malicious content. At the same time, another sub-industry has emerged wherein fraudsters use bots to build up account profiles and sell accounts with higher levels; or target
online currencies used within select games.
The overall attacks level for gaming grew 30% last quarter with most of the growth coming from new account registration attacks, which grew by over 70%.
Fraud Report
Q1 2020
Key Highlights Transaction Analysis ConclusionForeword Report Overview
arkoselabs.com © 2020
Gaming Attack Mix Variability
19
Attacks on gaming platforms have been primarily driven by automation, until this quarter when human-driven attacks grew sharply - especially for logins and payments. These attacks are driven by
in-game spam and abuse, while payment transactions were attacked targeting in-game currency, gift-card and auction house abuse. The high mix of human-driven attacks can be attributed to the
fact that these transactions require two-way interactions that automated bots can't accomplish.
Gaming attack volume varies during the day and peaks around early morning U.S. time when nearly every three out of ten logins and account registrations sessions are attacks. This peak coincides
with the highest mix of human-driven account takeover attacks as well.
As with previous quarters, the attack mix stayed relatively consistent throughout the day for account registrations but had a huge hourly variability for logins and payments.
Hourly Attack Rates by Use Case - Gaming
12AM 4AM 8AM 12PM 8PM4PM 12AM
10%
0%
30%
20%
LoginsRegistrations Payment
Hourly Human-Driven Attack Mix by Use Case - Gaming
12AM 4AM 8AM 12PM 8PM4PM 12AM
20%
0%
40%
60%
LoginsRegistrations Payment
Fraud Report
Q1 2020
Key Highlights Transaction Analysis ConclusionForeword Report Overview
arkoselabs.com © 2020
Gaming Attacks Seeing Increased Levels of Sophistication
20
Fraudsters are increasingly attacking gaming platforms looking for vulnerabilities with data values and events to manipulate the way they deal with any user session request.
The level of sophistication of attacks in the gaming space has evolved to client-side tampering where the fraudsters deliberately manipulate the signals being sent from their device and network, in
an attempt to subvert the logic flows of businesses’ fraud prevention systems.
In Q4 the Arkose Labs network detected two different, but connected, series of attacks where the fraudsters either tried to prevent the data being sent to the Arkose Labs or deliberately omitted
values to avoid specific logic flows in the Arkose Labs platform.
The fact that these attacks were seen in a close time period to one another speaks to the robustness of attackers’ communication networks and their ability to share information quickly.
Another testament to the connected fraud ecosystem is the sudden shift in attack origination, wherein the fraudsters quickly moved their traffic to a new location once transactions from a particular
outfit were detected.
Protecting against these attacks requires a dynamic platform that can detect and mitigate these tactics, with constant innovation needed to stay ahead of the fraudsters.
Fraud Report
Q1 2020
Key Highlights Transaction Analysis ConclusionForeword Report Overview
arkoselabs.com © 2020
Rising Attack Volumes on Social Media Platforms
21
Social media platforms have reshaped the way we connect, communicate and transact online. These platforms are becoming significant commerce enablers as they permeate more and more of
individuals’ daily lives, across social networking, professional interactions, online dating and media consumption.
The impact of the holiday season could be seen in the higher engagement across all social media platforms. Due to the amount of rich personal data on these applications and high user activity
levels, social platforms are lucrative targets for fraudsters looking to scrape content, write fake reviews, steal information or disseminate spam and malicious content.
In Q4 there was a sharp increase in attack volumes on the network for both account registrations and logins. Every two in five login attempts and every one in five new account registrations were
fraudulent, making this one of the highest industry attack rates. The human versus automated attack mix also rose with more than half of login attacks being human-driven. Taking over genuine
users’ accounts gives fraudsters the ability to disseminate spam and malicious content as well as manipulate the accounts for indirect monetization through likes and reviews.
14.3%
85.8%
Account
Registrations
Logins
Use Case
0% 10% 20% 30% 40% 50%
Account
Registrations
Logins
19.8%
41.1%
Attack Rates by Use Case - Social
Fraud Report
Q1 2020
Key Highlights Transaction Analysis ConclusionForeword Report Overview
arkoselabs.com © 2020
Social Media: Changing Attack Dynamics
22
Last quarter the attack mix for social media varied dramatically throughout the day, whereas in Q4 the mix of human-driven and automated attacks stayed very consistent.
The elevated rate of human-driven login attacks is supported by organized sweatshops, as well as lone fraudsters attempting to take over legitimate users’ accounts to manipulate or steal credentials
and disseminate spam.
With every two in five social media logins being an attack and over half of them being human-driven, it is clear that fraudsters target this customer touchpoint with hopes of downstream monetization.
Hourly Human-Driven Attack Mix by Use Case - Social
12AM 4AM 8AM 12PM 4PM 8PM
20%
0%
60%
40%
12AM
AttackRate
Time of Day
LoginsRegistrations
Fraud Report
Q1 2020
Key Highlights Transaction Analysis ConclusionForeword Report Overview
arkoselabs.com © 2020
Online Streaming Case Study: Intelligent Friction to Stop a Fraud Ring
23
The Arkose Labs platform detected a string of attacks on a media streaming platform, which could be connected back to a single fraud ring. Attackers varied their attack patterns, using spoofed data,
stolen credentials, network manipulation and obfuscating device fingerprints and IP addresses in an attempt to avoid detection.
The fraudsters were attempting to create fraudulent new accounts, abuse promotions and disseminate spam and malicious content. The fraudsters had detailed knowledge of the parameters used to
detect fraud and had the resources available to carry out multiple attacks over time while shifting their methods.
Arkose Labs was able to detect this suspicious activity by analyzing deep telltales which indicate fraud. This combined seamlessly with the challenge-response mechanism which was able to put a
stop to attacks using intelligent friction. Crucially, this approach not only remediated attacks but disincentivized the fraud ring, providing long-term protection against organized attacks.
Fraud Report
Q1 2020
10000
8000
6000
4000
0
2000
Good Traffic
Abuse from a
single fingerprint
Abuse from
rotating fingerprints
Abuse returned with no
obvious characteristic
Abuse from
rotating IP’s
Severe attack with
multiple patterns
Clean Traffic
Attackers returned
Organized AttackRegular Traffic
Key Highlights Transaction Analysis ConclusionForeword Report Overview
arkoselabs.com © 2020
Retail and Travel - Transaction Analysis
24
The impact of the holiday season was evident this quarter as the overall transaction volumes almost doubled compared to the previous quarter. More customers took to their favorite e-commerce
sites or travel portals to access promotions, make purchases, access their account or book travels. Q4 volumes were 3X for payment transactions, especially gift card payments.
Since most of this transaction growth was from good customers looking for holiday deals, the overall attack rates stayed flat this quarter while the total volume of attacks went up drastically.
Account takeover attacks grew 88% compared to Q3, while payment fraud went up 5X, primarily driven by automated gift card fraud. Human-driven attacks went up for both account logins and
registrations but reduced by 50% for payment transactions, driven by the reduction in activity from a sweatshop targeting gift card transactions.
Payments
21.1%
30.6%
48.3%
Account
Registrations
Logins
Use Case
0% 10%5% 15% 20%
Payments
Account
Registrations
Logins
7.7%
14.5%
18.5%
Attack Rates by Use Case - Retail & Travel
Fraud Report
Q1 2020
Key Highlights Transaction Analysis ConclusionForeword Report Overview
arkoselabs.com © 2020
Case Study: Ongoing Sweatshop Attack on Major Gift Card Provider
25
An ongoing battle with a major sweatshop operation finally ceased in Q4 after a sustained fraud attack on an e-commerce provider.
The attackers were specifically targeting gift card transactions using a high volume of requests, sometimes in the levels of tens of thousands a day. These attackers were using a hybrid approach by
combining automation and sweatshops to achieve both volume and sophistication at scale.
During the ongoing defense campaign, more than 30 different configuration setting measures were taken to detect attacks and continue adding friction in order to break the financial incentive of the
operation.
While this had no negative impact on genuine traffic, any request from this fraud ring was given upwards of 20 iterations of a time-consuming puzzle, while also being subjected to other measures
designed specifically to sap operational resources.
Fraud Report
Q1 2020
8:19 AM 8:40 AM 8:00 AM 9:20 AM 9:40 AM 9:00 AM 10:20 AM 10:40 AM 11:00 AM 11:20 AM 11:40 AM 12:00 PM 12:20 PM
Attack AttackAuthentic Usage
10000
8000
6000
4000
0
2000
Time of Day
Key Highlights Transaction Analysis ConclusionForeword Report Overview
arkoselabs.com © 2020
Case Study: Targeting Loyal Airline Customers
26
Fraud Report
Q1 2020
Airlines across the globe operate and manage loyalty programs to drive
engagement from their high-value customers. These loyalty programs often
offer air miles that can be redeemed for future travel, making them as valuable
as cash in the bank.
The more loyal a customer, the higher their ‘bank balance’, making them
attractive targets for fraudsters looking for a quick payday. Fraudsters looking
to abuse loyalty points use a variety of tricks to fool the airline’s defenses and
appear legitimate.
One such trick is to use an old browser to try to dupe the airline into serving a
simpler version of their page that is easier to scrape and manipulate. Another
tactic is to use automated tools to test credentials as a precursor to a more
targeted attack.
This quarter the network detected a series of transactions from old Chrome
browsers as well as high-velocity transactions from a single device that were
detected and were presented with targeted friction.
180K
160K
140K
120K
100K
80K
40K
20K
0
Session
Week of the Year
Old Browser Single Bad Fingerprint Other Attacks Types
15 19 23 27 31 35 39 43 47 51
Attack Types - Airline
Key Highlights Transaction Analysis ConclusionForeword Report Overview
arkoselabs.com © 2020
Mobile vs. Desktop Attack Patterns
The mobile share of transactions grew 20% compared to the previous quarter with every third transaction now originating from mobile devices. Overall attack levels for mobile grew compared to last
quarter, however, the growth of attacks for web transactions was higher, showing that this is still where fraudsters concentrate their efforts. Attacks on mobile transactions accounted for 33% of all
automated fraud attempts and 20% of all human-driven attacks.
The proportion of traffic coming from mobile varies by industry and use case. Over half of account registrations across industries are now mobile-driven. For social media, nearly seven in ten
transactions come from mobile, and nearly half of gaming, retail and travel transactions originated from mobile. On the other hand, finance and technology platforms continue to be primarily web-
driven.
27
Fraud Report
Q1 2020
Desktop
62.5%
37.5%
Mobile vs.
Mobile vs. Web Attack Mix
0% 10%5% 20%15% 25% 30%
Mobile
Desktop
16.5%
25.5%
Mobile vs Desktop: Attack Rate by Use Case
arkoselabs.com © 2020
Conclusion
28
Key Highlights Transaction Analysis ConclusionForeword Report OverviewFraud Report
Q1 2020
The last quarter of the year is a time when retailers and other digital businesses are under the most
pressure due to elevated consumer activity. As commercial pressures around conversion rates and
customer throughput are at their highest, this is when organized fraud mobilizes in force. They ramp
up activity not only to try and blend in with genuine traffic, but also to take advantage of companies
who shift their risk tolerance in the hope of letting through as many customers as possible.
Insights from the Arkose Labs platform shows that this time of year is not only the financial highlight
of the year for businesses, but also for fraudsters. The elevated rate of human-driven versus
automated fraud shows that attackers are willing to invest more in their attacks, often having laid the
groundwork in previous months using lower-cost automated attacks.
Both businesses and consumers increasingly recognize the need to have more accurate fraud
detection procedures in place to prevent widespread abuse. The only long-term strategy to stamping
out fraud is to adopt a zero-tolerance approach, which focuses on disrupting the economic drivers
underpinning fraud, using a combination of risk profiling and targeted authentication challenges.
Rather than shying away from introducing friction into the customer journey, we need to rethink how
this can be leveraged as a positive component. This proves to good users that they are being
protected and allows businesses to accept good transactions with confidence.
arkoselabs.com © 2020 29
Highlights Transaction Analysis ConclusionForeword Report Overview
Arkose Labs’ Fraud and Abuse Prevention Platform
Evaluating identity and intent
ARKOSE
DETECT
ARKOSE
ENFORCE
Arkose Detect is Trained by Arkose Enforce Results
Deep Device and
Network Forensics
Machine and Human
Specific Challenges
Graduated
Risk-Based Friction
Custom Enforcement
Challenge
Accessibility and
Language Support
User Behavior
Analytics (”Tell-Tale”)
Location
Assessment
Historical Attack
Pattern Calibration
Fraud Report
Q1 2020
Glossary
Industries
Gaming: Includes online gaming platforms.
Social: Includes social networking and dating
platforms.
TeTT chnology platforms: Includes online technology
providers like storage, access, and communication
platforms.
Retail and Travel: Includes e-commerce merchants,
sharing economy and travel portals.
FI and Fintech: Includes banks, online lenders,
money transfer providers, payment platforms.
Use Cases
New Account Origination: Account creation using
stolen details.
Logins: TeTT sting stolen credentials, account takeover.
Payments: Fraudulent transactions using stolen
credit card details.
arkoselabs.com © 2019 30
Telemetry and Enforcement
TeTT lemetry: The process that Arkose Labs’ risk engine
adopts to analyze customer context, reputation, and
behavior to intercept bad actors.
Attack Types
Automated Attacks
Sweatshop/Clickfarms: Employing a large group of
low-paid workers to launch attacks or make
fraudulent transactions.
Single Request Attack: A technique where breached
email addresses are automatically matched with the
topmost common passwords to facilitate account
takeover.
Inventory Scalping: An automated abuse of
functionality to hoard the goods/services stock
without making an actual purchase.
Payments Fraud: An illegitimate online transaction
completed by a fraudster.
Spam and Malicious Content: Unsolicited content
sent over the internet to disrupt services or extract
personal information.
Search and Scraping: A technique used to harvest
data and information off the websites.
Friendly Fraud: When a customer disputes a
transaction with the issuer after receiving the goods
or service.
Enforcement: Arkose Lab’s proprietary challenge-
response mechanism to remediate unrecognized
transactions and feed the conclusive responses
(good or bad) back to TeTT lemetry.
Fraud Types
Account TaTT keover: Breaking into a legitimate user
account and taking over control using the account
owner's personal information.
API Abuse: Business-level attacks that aim to exploit
API vulnerabilities in order to steal information.
Brute Force Attack: An automated trial-and-error
method used to extract passwords.
Common Attacks: Malicious actions aimed at
disrupting information networks of individuals or
organizations. Eg., Distributed Denial of Service
(DDoS), Phishing, SQL injection, Malware.
Denial of Inventory: Holding items from the inventory
to artificially deny availability of goods/services to
genuine customers.
Fake Account: An inauthentic account that has been
created using stolen details.
Gift Card Fraud: Numerous ways of stealing money
off the gift cards.
Key Highlights Transaction Analysis ConclusionForeword Report Overview
Fraud Types (cont.)Telemetry and Enforcement (cont.)
Fraud Report
Q1 2020
arkoselabs.com © 2020
Key Highlights Transaction Analysis ConclusionForeword Report Overview
About Arkose Labs
Arkose Labs bankrupts the business model of fraud. Its patented platform combines Arkose Detect, a sophisticated risk engine, with Arkose Enforce, which uses targeted step-up
challenges to wear fraudsters down and diminish their ROI. The world’s largest brands trust Arkose Labs to protect their customer journey while delivering an unrivaled user
experience.
arkoselabs.com © 2019. All Rights Reserved
Sales: (800) 604-3319
Offices
250 Montgomery St 10th Floor, San Francisco, CA 94104, USA
San Francisco Brisbane
315 Brunswick St, Brisbane, Queensland AU
Fraud Report
Q1 2020

Mais conteúdo relacionado

Mais procurados

Hi-Tech Crime Trends 2016
Hi-Tech Crime Trends 2016Hi-Tech Crime Trends 2016
Hi-Tech Crime Trends 2016Group-IB
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015Group-IB
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Jef Lacson
 
Enterprise Fraud Management
Enterprise Fraud ManagementEnterprise Fraud Management
Enterprise Fraud ManagementManish Desai
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryDistil Networks
 
Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014Group-IB
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad BotsDistil Networks
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsOilPriceInformationService
 

Mais procurados (20)

Hi-Tech Crime Trends 2016
Hi-Tech Crime Trends 2016Hi-Tech Crime Trends 2016
Hi-Tech Crime Trends 2016
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015
 
In app fraud vs app install fraud
In app fraud vs app install fraudIn app fraud vs app install fraud
In app fraud vs app install fraud
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
 
Estado del ransomware en 2020
Estado del ransomware en 2020Estado del ransomware en 2020
Estado del ransomware en 2020
 
Enterprise Fraud Management
Enterprise Fraud ManagementEnterprise Fraud Management
Enterprise Fraud Management
 
Fraud by Browser Study
Fraud by Browser StudyFraud by Browser Study
Fraud by Browser Study
 
Q1 2022 Update on ad fraud for AMM
Q1 2022 Update on ad fraud for AMMQ1 2022 Update on ad fraud for AMM
Q1 2022 Update on ad fraud for AMM
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad Inventory
 
Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014
 
History and Impact of Digital Ad Fraud
History and Impact of Digital Ad FraudHistory and Impact of Digital Ad Fraud
History and Impact of Digital Ad Fraud
 
Digital ad fraud is a Major Economic Crime
Digital ad fraud is a Major Economic CrimeDigital ad fraud is a Major Economic Crime
Digital ad fraud is a Major Economic Crime
 
What CFEs can do about digital ad fraud
What CFEs can do about digital ad fraudWhat CFEs can do about digital ad fraud
What CFEs can do about digital ad fraud
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
 
Digital Fraud Viewability Benchmarks Q4 2020
Digital Fraud Viewability Benchmarks Q4 2020Digital Fraud Viewability Benchmarks Q4 2020
Digital Fraud Viewability Benchmarks Q4 2020
 
Digital Ad Fraud Is Not Illegal Yet
Digital Ad Fraud Is Not Illegal YetDigital Ad Fraud Is Not Illegal Yet
Digital Ad Fraud Is Not Illegal Yet
 
Still nothing but ad fraud 2021 dr augustine fou
Still nothing but ad fraud 2021 dr augustine fouStill nothing but ad fraud 2021 dr augustine fou
Still nothing but ad fraud 2021 dr augustine fou
 
Investigating digital ad fraud spi virtual meeting
Investigating digital ad fraud   spi virtual meetingInvestigating digital ad fraud   spi virtual meeting
Investigating digital ad fraud spi virtual meeting
 

Semelhante a Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020

Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enBankir_Ru
 
Article global it systems are now even more vulnerable - paul wright
Article  global it systems are now even more vulnerable - paul wrightArticle  global it systems are now even more vulnerable - paul wright
Article global it systems are now even more vulnerable - paul wrightPaul Wright MSc
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingIJSRED
 
The Year in Phishing - RSA Fraud Report: January 2013
The Year in Phishing - RSA Fraud Report: January 2013The Year in Phishing - RSA Fraud Report: January 2013
The Year in Phishing - RSA Fraud Report: January 2013EMC
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016thinkASG
 
Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...
Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...
Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...Sarin Yuok
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce websiteDr. Raghavendra GS
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bbmarukanda
 
aman sharma mini project.pdf
aman sharma mini project.pdfaman sharma mini project.pdf
aman sharma mini project.pdfAmanSharma977554
 
aman sharma mini project.pdf
aman sharma mini project.pdfaman sharma mini project.pdf
aman sharma mini project.pdfAmanSharma977554
 
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaWhite Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaRaaj Khanna
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosHaltdos
 
Survival Guide for Million- Dollar Cyberattacks
 Survival Guide for Million- Dollar Cyberattacks Survival Guide for Million- Dollar Cyberattacks
Survival Guide for Million- Dollar CyberattacksPanda Security
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Molly Alexander
 

Semelhante a Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020 (20)

Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_en
 
Article global it systems are now even more vulnerable - paul wright
Article  global it systems are now even more vulnerable - paul wrightArticle  global it systems are now even more vulnerable - paul wright
Article global it systems are now even more vulnerable - paul wright
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
The Year in Phishing - RSA Fraud Report: January 2013
The Year in Phishing - RSA Fraud Report: January 2013The Year in Phishing - RSA Fraud Report: January 2013
The Year in Phishing - RSA Fraud Report: January 2013
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
 
Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...
Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...
Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...
 
The Impact of Technology on the Profession
The Impact of Technology on the ProfessionThe Impact of Technology on the Profession
The Impact of Technology on the Profession
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
 
state-of-fraud-2021.pdf
state-of-fraud-2021.pdfstate-of-fraud-2021.pdf
state-of-fraud-2021.pdf
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
Sel03129 usen
Sel03129 usenSel03129 usen
Sel03129 usen
 
aman sharma mini project.pdf
aman sharma mini project.pdfaman sharma mini project.pdf
aman sharma mini project.pdf
 
aman sharma mini project.pdf
aman sharma mini project.pdfaman sharma mini project.pdf
aman sharma mini project.pdf
 
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaWhite Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
5 main trends in cyber security for 2020
5 main trends in cyber security for 20205 main trends in cyber security for 2020
5 main trends in cyber security for 2020
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDos
 
Survival Guide for Million- Dollar Cyberattacks
 Survival Guide for Million- Dollar Cyberattacks Survival Guide for Million- Dollar Cyberattacks
Survival Guide for Million- Dollar Cyberattacks
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
 

Mais de Jeff Martinez

Gurminder Singh vs. Google LLC
Gurminder Singh vs. Google LLCGurminder Singh vs. Google LLC
Gurminder Singh vs. Google LLCJeff Martinez
 
The LA Riots & Economics of Urban Unrest
The LA Riots & Economics of Urban UnrestThe LA Riots & Economics of Urban Unrest
The LA Riots & Economics of Urban UnrestJeff Martinez
 
Coronavirus Aid, Relief, and Economic Security Act: What Is in It for US Edu...
Coronavirus Aid, Relief, and Economic Security Act:  What Is in It for US Edu...Coronavirus Aid, Relief, and Economic Security Act:  What Is in It for US Edu...
Coronavirus Aid, Relief, and Economic Security Act: What Is in It for US Edu...Jeff Martinez
 
FCC Declaratory Ruling COVID-19 & TCPA
FCC Declaratory Ruling COVID-19 & TCPAFCC Declaratory Ruling COVID-19 & TCPA
FCC Declaratory Ruling COVID-19 & TCPAJeff Martinez
 
Automate Lawsuit Filing? The Brave New World of "Anti Robocall Apps
Automate Lawsuit Filing?  The Brave New World of "Anti Robocall AppsAutomate Lawsuit Filing?  The Brave New World of "Anti Robocall Apps
Automate Lawsuit Filing? The Brave New World of "Anti Robocall AppsJeff Martinez
 
Union Station Parking Map
Union Station Parking MapUnion Station Parking Map
Union Station Parking MapJeff Martinez
 
CB Insights Global Fintech Report Q3 2019
CB Insights Global Fintech Report Q3 2019CB Insights Global Fintech Report Q3 2019
CB Insights Global Fintech Report Q3 2019Jeff Martinez
 
FinCEN Guidance on Convertible Virtual Currencies
FinCEN Guidance on Convertible Virtual CurrenciesFinCEN Guidance on Convertible Virtual Currencies
FinCEN Guidance on Convertible Virtual CurrenciesJeff Martinez
 
LegalShield ID Shield Personal Growth
LegalShield ID Shield Personal GrowthLegalShield ID Shield Personal Growth
LegalShield ID Shield Personal GrowthJeff Martinez
 
Members, Subcommittee on Digital Commerce and Consumer Protection Re: Underst...
Members, Subcommittee on Digital Commerce and Consumer Protection Re: Underst...Members, Subcommittee on Digital Commerce and Consumer Protection Re: Underst...
Members, Subcommittee on Digital Commerce and Consumer Protection Re: Underst...Jeff Martinez
 
US House of Representatives Relies on Oxford BioChronometrics Study for Hearing
US House of Representatives Relies on Oxford BioChronometrics Study for HearingUS House of Representatives Relies on Oxford BioChronometrics Study for Hearing
US House of Representatives Relies on Oxford BioChronometrics Study for HearingJeff Martinez
 
Coffey vs.Ripple Labs Class Action Lawsuit
Coffey vs.Ripple Labs Class Action LawsuitCoffey vs.Ripple Labs Class Action Lawsuit
Coffey vs.Ripple Labs Class Action LawsuitJeff Martinez
 
Cboe BZX Exchange Cryptocurrency Fund Letter to SEC
Cboe BZX Exchange Cryptocurrency Fund Letter to SECCboe BZX Exchange Cryptocurrency Fund Letter to SEC
Cboe BZX Exchange Cryptocurrency Fund Letter to SECJeff Martinez
 
Written Testimony of Chairman J Christopher Giancarlo before the Senate Banki...
Written Testimony of Chairman J Christopher Giancarlo before the Senate Banki...Written Testimony of Chairman J Christopher Giancarlo before the Senate Banki...
Written Testimony of Chairman J Christopher Giancarlo before the Senate Banki...Jeff Martinez
 
Sunshine Capital Halts Trading
Sunshine Capital Halts TradingSunshine Capital Halts Trading
Sunshine Capital Halts TradingJeff Martinez
 

Mais de Jeff Martinez (16)

Gurminder Singh vs. Google LLC
Gurminder Singh vs. Google LLCGurminder Singh vs. Google LLC
Gurminder Singh vs. Google LLC
 
The LA Riots & Economics of Urban Unrest
The LA Riots & Economics of Urban UnrestThe LA Riots & Economics of Urban Unrest
The LA Riots & Economics of Urban Unrest
 
Coronavirus Aid, Relief, and Economic Security Act: What Is in It for US Edu...
Coronavirus Aid, Relief, and Economic Security Act:  What Is in It for US Edu...Coronavirus Aid, Relief, and Economic Security Act:  What Is in It for US Edu...
Coronavirus Aid, Relief, and Economic Security Act: What Is in It for US Edu...
 
FCC Declaratory Ruling COVID-19 & TCPA
FCC Declaratory Ruling COVID-19 & TCPAFCC Declaratory Ruling COVID-19 & TCPA
FCC Declaratory Ruling COVID-19 & TCPA
 
Automate Lawsuit Filing? The Brave New World of "Anti Robocall Apps
Automate Lawsuit Filing?  The Brave New World of "Anti Robocall AppsAutomate Lawsuit Filing?  The Brave New World of "Anti Robocall Apps
Automate Lawsuit Filing? The Brave New World of "Anti Robocall Apps
 
Union Station Parking Map
Union Station Parking MapUnion Station Parking Map
Union Station Parking Map
 
CB Insights Global Fintech Report Q3 2019
CB Insights Global Fintech Report Q3 2019CB Insights Global Fintech Report Q3 2019
CB Insights Global Fintech Report Q3 2019
 
FinCEN Guidance on Convertible Virtual Currencies
FinCEN Guidance on Convertible Virtual CurrenciesFinCEN Guidance on Convertible Virtual Currencies
FinCEN Guidance on Convertible Virtual Currencies
 
LegalShield ID Shield Personal Growth
LegalShield ID Shield Personal GrowthLegalShield ID Shield Personal Growth
LegalShield ID Shield Personal Growth
 
The Hunt for 3ve
The Hunt for 3veThe Hunt for 3ve
The Hunt for 3ve
 
Members, Subcommittee on Digital Commerce and Consumer Protection Re: Underst...
Members, Subcommittee on Digital Commerce and Consumer Protection Re: Underst...Members, Subcommittee on Digital Commerce and Consumer Protection Re: Underst...
Members, Subcommittee on Digital Commerce and Consumer Protection Re: Underst...
 
US House of Representatives Relies on Oxford BioChronometrics Study for Hearing
US House of Representatives Relies on Oxford BioChronometrics Study for HearingUS House of Representatives Relies on Oxford BioChronometrics Study for Hearing
US House of Representatives Relies on Oxford BioChronometrics Study for Hearing
 
Coffey vs.Ripple Labs Class Action Lawsuit
Coffey vs.Ripple Labs Class Action LawsuitCoffey vs.Ripple Labs Class Action Lawsuit
Coffey vs.Ripple Labs Class Action Lawsuit
 
Cboe BZX Exchange Cryptocurrency Fund Letter to SEC
Cboe BZX Exchange Cryptocurrency Fund Letter to SECCboe BZX Exchange Cryptocurrency Fund Letter to SEC
Cboe BZX Exchange Cryptocurrency Fund Letter to SEC
 
Written Testimony of Chairman J Christopher Giancarlo before the Senate Banki...
Written Testimony of Chairman J Christopher Giancarlo before the Senate Banki...Written Testimony of Chairman J Christopher Giancarlo before the Senate Banki...
Written Testimony of Chairman J Christopher Giancarlo before the Senate Banki...
 
Sunshine Capital Halts Trading
Sunshine Capital Halts TradingSunshine Capital Halts Trading
Sunshine Capital Halts Trading
 

Último

Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsShree Krishna Exports
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingNauman Safdar
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Timegargpaaro
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 

Último (20)

Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial Wings
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 

Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020

  • 2. Key Highlights Transaction Analysis ConclusionForeword Report Overview arkoselabs.com © 2020 1 Fraud Report Q1 2020 Foreword Kevin Gosschalk CEO & Founder, Arkose Labs As we reflect on 2019, we see some notable shifts in the threat landscape, with businesses facing new levels of complexity in fraud orchestration. Rather than looking for the quick buck, fraudsters are playing the long game, with multi-step attacks that do not initially reveal their fraudulent intent. As the saying goes, ‘money makes the world go round’, and this could not be more true for the cybercrime underworld. Fraudsters’ unrelenting demand for fresh user credentials provides the financial incentive for cyber attackers carrying out major data breaches. When fraudsters successfully leverage the spoils from these breaches to make money, they will use the proceeds to invest in more advanced attack toolkits and greater volumes of stolen data. As a result, organizations find it increasingly difficult to defend against the barrage of attacks on their websites and apps. The only sustainable approach to curbing the cybercrime cycle of success is adopting a zero-tolerance approach to fraud prevention. Tolerating current fraud levels as a 'cost of doing business' exacerbates the problem long-term by providing the financial incentive for fraudsters. In-depth profiling of activity across customer touchpoints helps organizations facing subtle attacks that do not show immediate tell-tale signs of fraud. When combined with targeted friction, large-scale attacks quickly become unsustainable for fraudsters who have become accustomed to circumnavigating systems that avoid putting up barriers to users. As the latest data from the Arkose Labs platform show, attack rates are continuously on the rise. Going into 2020, the fraud- fighting community needs to finally win back the upper hand against fraudsters, protecting individuals and our society from the effects of cybercrime.
  • 3. 2 Report Overview Unsophisticated bot attacks don’t result in a user session and thus have not been included in this report. The report focuses on attacks from fraud outlets that combine state-of-the-art technology with stolen identity credentials and human efforts. The attack patterns have been analyzed across parameters and closely investigate the mechanics of inauthentic attacks as they range from automated bots to human or ‘sweatshop’ driven attacks. These attacks focus on defrauding the businesses and their users through fraudulent account registrations, account takeovers or payments using stolen credentials. Arkose Labs uses a bilateral approach that combines global telemetry with a patent-pending enforcement challenge to profile user activity in detail and act upon data in real-time. This provides unique insights into attacker identification and classification, enabling the platform to deploy appropriate responses and countermeasures. Suspect sessions are identified when they show characteristics that have been classified as abusive or malicious by Arkose Labs, based on previous activity on other customers’ digital properties. While Arkose Labs supports multiple use cases across the customer journey, these have been broadly grouped under account registrations, logins and payments. The Q1 Arkose Labs Fraud and Abuse Report is based on actual user sessions and attack patterns that were analyzed by the Arkose Labs Fraud and Abuse Prevention Platform from Oct to Dec 2019. These sessions, spanning account registrations, logins and payments from financial services, ecommerce, travel, social media, gaming and emerging technology were analyzed in real-time to provide insights into the evolving fraud and risk landscape. Key Highlights Transaction Analysis ConclusionForeword Report Overview arkoselabs.com © 2020 Fraud Report Q1 2020
  • 4. Key Highlights ransaction Analysis ConclusionForeword Report Overview Q1 Fraud Report Highlights 3arkoselabs.com © 2020 Fraud Report Q1 2020 Record holiday shopping transactions bring record fraud levels with attacks steadily increasing throughout the quarter. Evolving attack patterns show fraudsters using more sophisticated tools and attempting to stay under the radar by using rotation and randomization of characteristics to blend in with authentic traffic. Sweatshop-driven attacks from countries like Venezuela, Vietnam, Thailand, India and Ukraine continue to grow, while these attacks from the Philippines, Russia and Ukraine have almost tripled compared to Q2 The key countries where human-driven attacks originated from shifted again this quarter, showing fraudsters tapping into human farms across different locations to optimize their costs. Attack volumes vary rapidly, with fraudsters attacking in short bursts across the quarter, using inconsistent timing to prevent businesses from predicting when they will be targeted. Automated attacks are becoming more complex as fraudsters mimic good customer behavior and attempt to deploy enhanced machine vision technology to bypass challenges. Automated attacks grew by 25% while human-driven attacks grew by 90% compared to Q2 2019 Attacks from the Philippines and Russia almost doubled compared to Q2.
  • 5. Key Highlights Transaction Analysis ConclusionForeword Report Overview Industry Roundup 4arkoselabs.com © 2020 Fraud Report Q1 2020 82%increase in sweatshop attacks for social media. Two out of five social media logins is an attack, with over 50% being human-driven. New account fraud for gaming grew by 74% compared to Q2. 2X growth in holiday season traffic for travel and retail. 2X Attack mix for financial services shifted dramatically with almost all account takeover attacks coming from automated bots. Attack rates on logins for technology platforms grew by 58%. Gaming Fintech Information TechnologyTourism Social Media
  • 6. Key Highlights ransaction Analysis ConclusionForeword Report Overview 5arkoselabs.com © 2020 Global Attack Patterns - The Race to Monetization Fraud Report Q1 2020 The globally connected nature of cybercrime is evident in the rapidly shifting attack hubs each quarter. Improvements in technology infrastructure coupled with availability of cheap labor has made certain developing economies, especially in Southeast Asia and Latin America, lucrative fraud hubs for cybercriminals everywhere. This quarter Arkose Labs saw a sharp increase in attacks across industries and use cases, primarily from emerging economies like the Philippines, Russia and Indonesia where the attack volume nearly doubled compared to Q2 2019. The Philippines re-emerged as the top attacker this quarter, with every third attack originating from there. These attacks target digital businesses across the globe, especially in tech, gaming and social verticals. 1-10 Top Attack Originators 11-20 21-50 51-195
  • 7. Key Highlights Transaction Analysis ConclusionForeword Report Overview The holiday season retail extravaganza, business-driven purchasing events and a spike in year-end travel means digital commerce was at its very peak last quarter. Fraudsters around the world mobilized, looking to take advantage of busy transaction volumes in order to launch and disguise attacks. This quarter saw a shift towards human-driven attacks. These attacks grew a whopping ~90% compared to six months prior, whereas automated attacks grew at a rate of 25%. The growth in human-driven fraud can be attributed to fraudsters shifting their tactics in response to decreasing success rates of automated attacks, due to an increased focus on identity proofing and corroboration across industries. Additionally, many automated attacks are focused on testing or validating credentials in preparation for a more targeted human-driven attack. These testing attacks take place in the months preceding the holiday season. This quarter, attacks from the Philippines, Russia, Indonesia, Thailand and Vietnam grew sharply, primarily from human-driven attacks. Top Attack Originators and their Attack Mix Automated Human-Driven United States 28.9% 72.1% Philippines 54.6% 45.4% Russia 66.9% 33.1% Great Britain 29.3% 70.7% Ukraine 69.9% 30.1% 6arkoselabs.com © 2020 Top Attackers Across the Globe Fraud Report Q1 2020
  • 8. Key Highlights Transaction Analysis ConclusionForeword Report Overview Hourly Variability for Human vs Automated Attacks 12AM 4AM 8AM 12PM 12AM8PM4PM 10% 0% 20% 30% Percentageofhuman-drivenattacks Time of Day 7arkoselabs.com © 2020 Attack volumes were elevated this quarter, due to the availability of fresh user data off the back of recent breaches. On top of this, there was an increase in attacks targeting a select number of key business groups, demonstrating how fraudsters launch large-scale attacks on specific websites and apps. Not only but they are also the fraudsters attacking in greater volume, they are also shifting attack patterns in order to maximize their returns during the busy digital commerce period. This quarter, peak attack timings were earlier in the day compared to the previous quarter. Consumers deviate from their normal transactional habits as they participate in the early morning rush to get the best deals during the holiday shopping season. Fraudsters will subsequently adapt their own attack timings in an attempt to blend in with spikes in legitimate traffic. The variability of human versus automated attacks was more pronounced this quarter. Sweatshop-driven attack levels increased during the high traffic periods, with peak attack levels 50% higher than seen in Q2 2019. Attack Patterns Shift During Peak Commerce Season Fraud Report Q1 2020
  • 9. Key Highlights ransaction Analysis ConclusionForeword Report Overview 8arkoselabs.com © 2020 Top Four Takeaways from the Holiday Shopping Season Fraud Report Q1 2020 Automated and Human Attacks 40 42 44 46 5048 52 Weeks of the year AttackVolume Human-DrivenAutomated Heightened user engagement across all use cases, driven by promotions, deals and last- minute shopping. Fluctuations in the attack mix show fraudsters experimenting to find the optimal blend in order to maximize return on investment. Shift towards human-driven attacks versus automated attacks at the end of the period as fraudsters invest in more targeted action. Steady increase in fraudulent activity with the number of detected attacks rising notably throughout the quarter.
  • 10. Key Highlights Transaction Analysis ConclusionForeword Report Overview 9arkoselabs.com © 2020 A Strategic Approach to Maximizing Fraud Returns Fraud Report Q1 2020 Digital interactions are continuing to grow at a rapid pace as more and more business models, use cases and customer interactions move online and to mobile devices. One unintended consequence of this growth has been the increase of fraud. As these transactions have grown, so had the number of attacks targeting these use cases. What makes the situation more complex is the fact that this growth in attacks comes with increased sophistication in attack patterns. Just as businesses evolve their security stacks and defense strategies, cybercriminals are taking an increasingly strategic approach to their activity. They experiment with the optimal attack mix, from high-velocity but low-sophistication abuse to targeted attacks which accurately mimic real user behavior. In the quest for the best return on investment, fraudsters use all the tools at their disposal, and attack patterns shift depending on whether they are deploying automated tools, human resources or a hybrid of the two. Reverse engineering of anti-fraud technologies ascertains what data systems rely on to differentiate fraud from good customers. Businesses who rely solely on data-driven fraud prevention can leave themselves vulnerable to advanced spoofing techniques and single request attacks. NumberofAttacks Time AttackSophistication High velocity, low variation in transaction characteristics Sophisticated characteristic spoofing, but some mistakes in data High variation in characteristics but with unnatural pattern, low velocity Low velocity with sophisticated client-side tampering
  • 11. Key Highlights ransaction Analysis ConclusionForeword Report Overview Human-Driven vs Automated Attack - By Industry 0% Finance Gaming Social Tech Travel & Retail 25% 75% 50% 100% Automated Human 10arkoselabs.com © 2020 Human vs the Machine: Attack Mix by Industry Fraud Report Q1 2020 This quarter, nearly two in every five attacks were human-driven, representing a 33% increase over Q2 2019. However, the attack mix shifts greatly depending on the customer touchpoint and industry - with more human attacks when there is a higher potential of monetization. Often automated attacks are a precursor to a sophisticated human-driven attack. The key for fraudsters is to find the right mix of human effort and bots, and tactics will change over time as more complex, multi-step attacks progress. This quarter, we saw a big shift in financial services, with fraudsters shifting their attack patterns to primarily automated, in order to test credentials for account takeover. On the other hand, gaming, travel, retail and social continue to see a high mix of human-driven attacks, especially for account registrations. Understanding attacks trend is vital for effective defense. The higher cost of human-driven attacks means that fraudsters will quickly abandon attack once it proves too difficult, making targeted friction highly effective against large-scale attacks.
  • 12. Key Highlights ransaction Analysis ConclusionForeword Report Overview Human-Driven Attack Rates - By Use Case 12AM 4AM 8AM 12PM 4PM 20% 0% 60% 40% 8PM 12AM PercentageofallAttack Time of Day LoginsRegistrations Payment 11arkoselabs.com © 2020 Changes to the Attack Mix Across Q4 Attacks during the period leading up to the holiday season were focused on validating and priming credentials, with a heavy reliance on automated tools to carry out new account fraud. During Q4 the focus of attacks shifted towards account takeover and payments, with elevated rates of human-driven attacks. As digital commerce hits its busy period, many businesses adapt their risk tolerance to let as many users through as possible. Fraudsters capitalize on this move by trying to pass themselves off as legitimate customers, and leverage sweatshops to scale up human-driven attacks. Taking over a legitimate person’s account gives them instant credibility and enables them to transact freely. This quarter, human-driven attacks on account logins went up with almost half of the attacks coming from humans during peak volume times for both payments and logins. Payment transactions continue to have the highest variability during the day, especially during peak shopping days where it's easier for fraudsters to blend in with legitimate traffic. Fraud Report Q1 2020
  • 13. Key Highlights ransaction Analysis ConclusionForeword Report Overview 12arkoselabs.com © 2020 Fraud Report Q1 2020 Attack Incentive Index Disparities in wages and cost of labor, differing costs of living and the comparative purchasing power of different currencies, and access to technology shift incentive levels among would-be fraudsters. Using regional economic indicators combined with Arkose Labs’ data on known attacks, we have created an Attack Incentive Index for countries across the globe. The higher the incentive, the more resources they are likely to put behind attacks while still preserving return on investment (ROI). Areas with high incentive levels have more financial motivation to become involved in cybercrime. They will persevere longer than average when they meet resistance or friction, before abandoning attacks. Low HighMedium
  • 14. Key Highlights Transaction Analysis ConclusionForeword Report Overview 13arkoselabs.com © 2020 Fraud Trends Across Customer Touchpoints 2019 was a watershed year for data breaches and its impact is seen in the growing attack rates, which grew 26% compared to Q2, primarily driven by fake account registrations, gift card fraud and account takeover attacks. Arkose Labs works with businesses across the customer journey, with transactions being grouped under account creation, login, and payments. Nearly three out of four digital sessions are account logins. Account takeover attacks increased by 35% compared to Q2, underscoring the value of gaining access to users’ accounts. A shift in tactics was evident this quarter as human-driven account takeover attacks more than doubled compared to Q2 whereas automated account registrations increased by 90%. These attacks may seem disconnected but are a part of a complex cybercrime ecosystem. As fraudsters find it hard to launch successful account takeover attacks using automated tools, they shift their focus to human-led attacks wherein an unsuccessful account registration attack can provide valuable insights into the existence of an account with the business, paving the way for a sophisticated account takeover attack. 0% 5% 10% 15% 20% 25% Payments Account Registrations Logins 20.8% 22.6% 17.2% Attack Rates by Use Case Fraud Report Q1 2020 Payments 2% 21.3% 76.7% Account Registrations Logins Transactions by Use Case
  • 15. Key Highlights Transaction Analysis ConclusionForeword Report Overview 14arkoselabs.com © 2020 Fraud in the World of Finance and FinTech As the financial services industry continues to transform and fintech solutions continue to gain traction, the fraud and abuse targeting digital customers is constantly shifting. 12% of financial services logins were fraud attempts. However, the overall attack levels for this sector fell this quarter compared to the previous ones, especially for human-driven attacks. This underscores the connected nature of global fraud and cybercrime. In a busy retail quarter, fraudsters will shift their resources and focus to maximize their financial returns. Arkose Labs works with financial services providers and fintech operators to protect account logins and associated activities, including balance checks and account updates carried out on desktop and mobile applications. Fraud Report Q1 2020 Hourly Attack Rate - Finance 12AM 4AM 8AM 12PM 4PM 8PM 0% 15% 10% 12AM AttackRate Time of Day Account Takeover Attack Rate - Finance 11.9% Attacks
  • 16. Payments 2% 21.3% 76.7% Account Registrations Logins Transactions by Use Case Key Highlights Transaction Analysis ConclusionForeword Report Overview arkoselabs.com © 2020 Technology Platforms Face an Array of Fraud and Abuse Tactics Fraud attacks on technology platforms further underscore the creative ways in which fraudsters monetize stolen credentials and resources. These platforms offer solutions to both individuals and businesses looking to leverage the convenience of communication platforms, flexible storage and office tools. Primary use cases in this segment are account registrations and logins, with recurring payments passively funding access. These use cases are increasingly attacked by fraudsters across the globe, and this segment experiences one of the highest levels of attacks from sweatshops. Account takeover for content scraping and spam dissemination is emerging as a big attack vector. Technology platforms also must be vigilant and protect against bad actors misusing the account registration for promotion abuse, credential testing and account resale. More than half of new account registration fraud is human-driven, while login and scraping attacks are primarily automated. New account registration attacks on technology platforms grew 20% compared to Q2 2019, while login and scraping attacks grew 50%. 15 Logins 75.1% 24.9% Account Registrations Use Case 0% 5% 10% 15% 20% Account Registrations Logins 19.9% 15.6% Attack Rates by Use Case - Technology Fraud Report Q1 2020
  • 17. Key Highlights Transaction Analysis ConclusionForeword Report Overview arkoselabs.com © 2020 Attack Mix for Technology Platforms Attack rates for the technology segment grew 40% this quarter compared to Q2. The human-driven attack mix declined closer to the holiday season but went up again towards the end of the year. This speaks to how fraudsters optimize their resources to focus on the best monetization potential. Despite the overall decline, ~40% of all registration attacks are human-driven, whereas almost all of login attacks are automated. 16 Hourly Attack Rates by Use Case- Technology 12AM 4AM 8AM 12PM 12AM8PM4PM 10% 0% 30% 20% 50% 40% LoginsRegistrations Time of Day Daily Human-Driven Attack Rates - Technology 1 2 3 4 5% 0% 15% 10% 20% Weeks of the Month Fraud Report Q1 2020
  • 18. Key Highlights Transaction Analysis ConclusionForeword Report Overview arkoselabs.com © 2020 Monetizing Tech Platforms - Continued Onslaught of Human Sweatshops Abuse on technology platform registration continues from across the globe. These attacks demonstrate the knowledge-sharing between sophisticated fraudsters that sometimes rely on sweatshops to carry out preparation activity for a larger cybercrime attack. In the past few quarters the network has identified a series of human-driven attacks wherein fraudsters in China, U.S, India, Brazil and Russia set up fraudulent accounts to abuse promotions offering free servicer time to mine for Bitcoin. Over the quarter, the fraudsters shifted their attack patterns and locations with different regions carrying out the attacks over time. The amount of effort a fraudster will expend is proportional to the value they get. The high monetization potential associated with bitcoin mining justifies the elevated levels of human-driven attacks, albeit from low-cost countries. 17 Fraud Report Q1 2020 15 19 23 27 31 35 39 43 47 51 1000K 0K 200K 400K 600K 800K Daily Automated vs. Human-Driven Attack Rates - Technology Sessions Time of Day Automated Human Driven
  • 19. Key Highlights Transaction Analysis ConclusionForeword Report Overview arkoselabs.com © 2020 Gaming Transaction Analysis 18 Payments 1.6% 21% 77.4% Account Registrations Logins Use Case 0% 10%5% 20%15% 25% Payments Account Registrations Logins 21.7% 22% 16.5% Attack Rates by Use Case - Gaming As millions of users of all ages increasingly engage in online games, the industry has expanded and has given birth to a commerce ecosystem that has become another monetization avenue for fraudsters across the globe. The attacks on these gaming platforms are persistent and highly sophisticated. Fraudsters use these platforms to use stolen payment methods, stealing in-game assets, abusing the auction houses and disseminating malicious content. At the same time, another sub-industry has emerged wherein fraudsters use bots to build up account profiles and sell accounts with higher levels; or target online currencies used within select games. The overall attacks level for gaming grew 30% last quarter with most of the growth coming from new account registration attacks, which grew by over 70%. Fraud Report Q1 2020
  • 20. Key Highlights Transaction Analysis ConclusionForeword Report Overview arkoselabs.com © 2020 Gaming Attack Mix Variability 19 Attacks on gaming platforms have been primarily driven by automation, until this quarter when human-driven attacks grew sharply - especially for logins and payments. These attacks are driven by in-game spam and abuse, while payment transactions were attacked targeting in-game currency, gift-card and auction house abuse. The high mix of human-driven attacks can be attributed to the fact that these transactions require two-way interactions that automated bots can't accomplish. Gaming attack volume varies during the day and peaks around early morning U.S. time when nearly every three out of ten logins and account registrations sessions are attacks. This peak coincides with the highest mix of human-driven account takeover attacks as well. As with previous quarters, the attack mix stayed relatively consistent throughout the day for account registrations but had a huge hourly variability for logins and payments. Hourly Attack Rates by Use Case - Gaming 12AM 4AM 8AM 12PM 8PM4PM 12AM 10% 0% 30% 20% LoginsRegistrations Payment Hourly Human-Driven Attack Mix by Use Case - Gaming 12AM 4AM 8AM 12PM 8PM4PM 12AM 20% 0% 40% 60% LoginsRegistrations Payment Fraud Report Q1 2020
  • 21. Key Highlights Transaction Analysis ConclusionForeword Report Overview arkoselabs.com © 2020 Gaming Attacks Seeing Increased Levels of Sophistication 20 Fraudsters are increasingly attacking gaming platforms looking for vulnerabilities with data values and events to manipulate the way they deal with any user session request. The level of sophistication of attacks in the gaming space has evolved to client-side tampering where the fraudsters deliberately manipulate the signals being sent from their device and network, in an attempt to subvert the logic flows of businesses’ fraud prevention systems. In Q4 the Arkose Labs network detected two different, but connected, series of attacks where the fraudsters either tried to prevent the data being sent to the Arkose Labs or deliberately omitted values to avoid specific logic flows in the Arkose Labs platform. The fact that these attacks were seen in a close time period to one another speaks to the robustness of attackers’ communication networks and their ability to share information quickly. Another testament to the connected fraud ecosystem is the sudden shift in attack origination, wherein the fraudsters quickly moved their traffic to a new location once transactions from a particular outfit were detected. Protecting against these attacks requires a dynamic platform that can detect and mitigate these tactics, with constant innovation needed to stay ahead of the fraudsters. Fraud Report Q1 2020
  • 22. Key Highlights Transaction Analysis ConclusionForeword Report Overview arkoselabs.com © 2020 Rising Attack Volumes on Social Media Platforms 21 Social media platforms have reshaped the way we connect, communicate and transact online. These platforms are becoming significant commerce enablers as they permeate more and more of individuals’ daily lives, across social networking, professional interactions, online dating and media consumption. The impact of the holiday season could be seen in the higher engagement across all social media platforms. Due to the amount of rich personal data on these applications and high user activity levels, social platforms are lucrative targets for fraudsters looking to scrape content, write fake reviews, steal information or disseminate spam and malicious content. In Q4 there was a sharp increase in attack volumes on the network for both account registrations and logins. Every two in five login attempts and every one in five new account registrations were fraudulent, making this one of the highest industry attack rates. The human versus automated attack mix also rose with more than half of login attacks being human-driven. Taking over genuine users’ accounts gives fraudsters the ability to disseminate spam and malicious content as well as manipulate the accounts for indirect monetization through likes and reviews. 14.3% 85.8% Account Registrations Logins Use Case 0% 10% 20% 30% 40% 50% Account Registrations Logins 19.8% 41.1% Attack Rates by Use Case - Social Fraud Report Q1 2020
  • 23. Key Highlights Transaction Analysis ConclusionForeword Report Overview arkoselabs.com © 2020 Social Media: Changing Attack Dynamics 22 Last quarter the attack mix for social media varied dramatically throughout the day, whereas in Q4 the mix of human-driven and automated attacks stayed very consistent. The elevated rate of human-driven login attacks is supported by organized sweatshops, as well as lone fraudsters attempting to take over legitimate users’ accounts to manipulate or steal credentials and disseminate spam. With every two in five social media logins being an attack and over half of them being human-driven, it is clear that fraudsters target this customer touchpoint with hopes of downstream monetization. Hourly Human-Driven Attack Mix by Use Case - Social 12AM 4AM 8AM 12PM 4PM 8PM 20% 0% 60% 40% 12AM AttackRate Time of Day LoginsRegistrations Fraud Report Q1 2020
  • 24. Key Highlights Transaction Analysis ConclusionForeword Report Overview arkoselabs.com © 2020 Online Streaming Case Study: Intelligent Friction to Stop a Fraud Ring 23 The Arkose Labs platform detected a string of attacks on a media streaming platform, which could be connected back to a single fraud ring. Attackers varied their attack patterns, using spoofed data, stolen credentials, network manipulation and obfuscating device fingerprints and IP addresses in an attempt to avoid detection. The fraudsters were attempting to create fraudulent new accounts, abuse promotions and disseminate spam and malicious content. The fraudsters had detailed knowledge of the parameters used to detect fraud and had the resources available to carry out multiple attacks over time while shifting their methods. Arkose Labs was able to detect this suspicious activity by analyzing deep telltales which indicate fraud. This combined seamlessly with the challenge-response mechanism which was able to put a stop to attacks using intelligent friction. Crucially, this approach not only remediated attacks but disincentivized the fraud ring, providing long-term protection against organized attacks. Fraud Report Q1 2020 10000 8000 6000 4000 0 2000 Good Traffic Abuse from a single fingerprint Abuse from rotating fingerprints Abuse returned with no obvious characteristic Abuse from rotating IP’s Severe attack with multiple patterns Clean Traffic Attackers returned Organized AttackRegular Traffic
  • 25. Key Highlights Transaction Analysis ConclusionForeword Report Overview arkoselabs.com © 2020 Retail and Travel - Transaction Analysis 24 The impact of the holiday season was evident this quarter as the overall transaction volumes almost doubled compared to the previous quarter. More customers took to their favorite e-commerce sites or travel portals to access promotions, make purchases, access their account or book travels. Q4 volumes were 3X for payment transactions, especially gift card payments. Since most of this transaction growth was from good customers looking for holiday deals, the overall attack rates stayed flat this quarter while the total volume of attacks went up drastically. Account takeover attacks grew 88% compared to Q3, while payment fraud went up 5X, primarily driven by automated gift card fraud. Human-driven attacks went up for both account logins and registrations but reduced by 50% for payment transactions, driven by the reduction in activity from a sweatshop targeting gift card transactions. Payments 21.1% 30.6% 48.3% Account Registrations Logins Use Case 0% 10%5% 15% 20% Payments Account Registrations Logins 7.7% 14.5% 18.5% Attack Rates by Use Case - Retail & Travel Fraud Report Q1 2020
  • 26. Key Highlights Transaction Analysis ConclusionForeword Report Overview arkoselabs.com © 2020 Case Study: Ongoing Sweatshop Attack on Major Gift Card Provider 25 An ongoing battle with a major sweatshop operation finally ceased in Q4 after a sustained fraud attack on an e-commerce provider. The attackers were specifically targeting gift card transactions using a high volume of requests, sometimes in the levels of tens of thousands a day. These attackers were using a hybrid approach by combining automation and sweatshops to achieve both volume and sophistication at scale. During the ongoing defense campaign, more than 30 different configuration setting measures were taken to detect attacks and continue adding friction in order to break the financial incentive of the operation. While this had no negative impact on genuine traffic, any request from this fraud ring was given upwards of 20 iterations of a time-consuming puzzle, while also being subjected to other measures designed specifically to sap operational resources. Fraud Report Q1 2020 8:19 AM 8:40 AM 8:00 AM 9:20 AM 9:40 AM 9:00 AM 10:20 AM 10:40 AM 11:00 AM 11:20 AM 11:40 AM 12:00 PM 12:20 PM Attack AttackAuthentic Usage 10000 8000 6000 4000 0 2000 Time of Day
  • 27. Key Highlights Transaction Analysis ConclusionForeword Report Overview arkoselabs.com © 2020 Case Study: Targeting Loyal Airline Customers 26 Fraud Report Q1 2020 Airlines across the globe operate and manage loyalty programs to drive engagement from their high-value customers. These loyalty programs often offer air miles that can be redeemed for future travel, making them as valuable as cash in the bank. The more loyal a customer, the higher their ‘bank balance’, making them attractive targets for fraudsters looking for a quick payday. Fraudsters looking to abuse loyalty points use a variety of tricks to fool the airline’s defenses and appear legitimate. One such trick is to use an old browser to try to dupe the airline into serving a simpler version of their page that is easier to scrape and manipulate. Another tactic is to use automated tools to test credentials as a precursor to a more targeted attack. This quarter the network detected a series of transactions from old Chrome browsers as well as high-velocity transactions from a single device that were detected and were presented with targeted friction. 180K 160K 140K 120K 100K 80K 40K 20K 0 Session Week of the Year Old Browser Single Bad Fingerprint Other Attacks Types 15 19 23 27 31 35 39 43 47 51 Attack Types - Airline
  • 28. Key Highlights Transaction Analysis ConclusionForeword Report Overview arkoselabs.com © 2020 Mobile vs. Desktop Attack Patterns The mobile share of transactions grew 20% compared to the previous quarter with every third transaction now originating from mobile devices. Overall attack levels for mobile grew compared to last quarter, however, the growth of attacks for web transactions was higher, showing that this is still where fraudsters concentrate their efforts. Attacks on mobile transactions accounted for 33% of all automated fraud attempts and 20% of all human-driven attacks. The proportion of traffic coming from mobile varies by industry and use case. Over half of account registrations across industries are now mobile-driven. For social media, nearly seven in ten transactions come from mobile, and nearly half of gaming, retail and travel transactions originated from mobile. On the other hand, finance and technology platforms continue to be primarily web- driven. 27 Fraud Report Q1 2020 Desktop 62.5% 37.5% Mobile vs. Mobile vs. Web Attack Mix 0% 10%5% 20%15% 25% 30% Mobile Desktop 16.5% 25.5% Mobile vs Desktop: Attack Rate by Use Case
  • 29. arkoselabs.com © 2020 Conclusion 28 Key Highlights Transaction Analysis ConclusionForeword Report OverviewFraud Report Q1 2020 The last quarter of the year is a time when retailers and other digital businesses are under the most pressure due to elevated consumer activity. As commercial pressures around conversion rates and customer throughput are at their highest, this is when organized fraud mobilizes in force. They ramp up activity not only to try and blend in with genuine traffic, but also to take advantage of companies who shift their risk tolerance in the hope of letting through as many customers as possible. Insights from the Arkose Labs platform shows that this time of year is not only the financial highlight of the year for businesses, but also for fraudsters. The elevated rate of human-driven versus automated fraud shows that attackers are willing to invest more in their attacks, often having laid the groundwork in previous months using lower-cost automated attacks. Both businesses and consumers increasingly recognize the need to have more accurate fraud detection procedures in place to prevent widespread abuse. The only long-term strategy to stamping out fraud is to adopt a zero-tolerance approach, which focuses on disrupting the economic drivers underpinning fraud, using a combination of risk profiling and targeted authentication challenges. Rather than shying away from introducing friction into the customer journey, we need to rethink how this can be leveraged as a positive component. This proves to good users that they are being protected and allows businesses to accept good transactions with confidence.
  • 30. arkoselabs.com © 2020 29 Highlights Transaction Analysis ConclusionForeword Report Overview Arkose Labs’ Fraud and Abuse Prevention Platform Evaluating identity and intent ARKOSE DETECT ARKOSE ENFORCE Arkose Detect is Trained by Arkose Enforce Results Deep Device and Network Forensics Machine and Human Specific Challenges Graduated Risk-Based Friction Custom Enforcement Challenge Accessibility and Language Support User Behavior Analytics (”Tell-Tale”) Location Assessment Historical Attack Pattern Calibration Fraud Report Q1 2020
  • 31. Glossary Industries Gaming: Includes online gaming platforms. Social: Includes social networking and dating platforms. TeTT chnology platforms: Includes online technology providers like storage, access, and communication platforms. Retail and Travel: Includes e-commerce merchants, sharing economy and travel portals. FI and Fintech: Includes banks, online lenders, money transfer providers, payment platforms. Use Cases New Account Origination: Account creation using stolen details. Logins: TeTT sting stolen credentials, account takeover. Payments: Fraudulent transactions using stolen credit card details. arkoselabs.com © 2019 30 Telemetry and Enforcement TeTT lemetry: The process that Arkose Labs’ risk engine adopts to analyze customer context, reputation, and behavior to intercept bad actors. Attack Types Automated Attacks Sweatshop/Clickfarms: Employing a large group of low-paid workers to launch attacks or make fraudulent transactions. Single Request Attack: A technique where breached email addresses are automatically matched with the topmost common passwords to facilitate account takeover. Inventory Scalping: An automated abuse of functionality to hoard the goods/services stock without making an actual purchase. Payments Fraud: An illegitimate online transaction completed by a fraudster. Spam and Malicious Content: Unsolicited content sent over the internet to disrupt services or extract personal information. Search and Scraping: A technique used to harvest data and information off the websites. Friendly Fraud: When a customer disputes a transaction with the issuer after receiving the goods or service. Enforcement: Arkose Lab’s proprietary challenge- response mechanism to remediate unrecognized transactions and feed the conclusive responses (good or bad) back to TeTT lemetry. Fraud Types Account TaTT keover: Breaking into a legitimate user account and taking over control using the account owner's personal information. API Abuse: Business-level attacks that aim to exploit API vulnerabilities in order to steal information. Brute Force Attack: An automated trial-and-error method used to extract passwords. Common Attacks: Malicious actions aimed at disrupting information networks of individuals or organizations. Eg., Distributed Denial of Service (DDoS), Phishing, SQL injection, Malware. Denial of Inventory: Holding items from the inventory to artificially deny availability of goods/services to genuine customers. Fake Account: An inauthentic account that has been created using stolen details. Gift Card Fraud: Numerous ways of stealing money off the gift cards. Key Highlights Transaction Analysis ConclusionForeword Report Overview Fraud Types (cont.)Telemetry and Enforcement (cont.) Fraud Report Q1 2020
  • 32. arkoselabs.com © 2020 Key Highlights Transaction Analysis ConclusionForeword Report Overview About Arkose Labs Arkose Labs bankrupts the business model of fraud. Its patented platform combines Arkose Detect, a sophisticated risk engine, with Arkose Enforce, which uses targeted step-up challenges to wear fraudsters down and diminish their ROI. The world’s largest brands trust Arkose Labs to protect their customer journey while delivering an unrivaled user experience. arkoselabs.com © 2019. All Rights Reserved Sales: (800) 604-3319 Offices 250 Montgomery St 10th Floor, San Francisco, CA 94104, USA San Francisco Brisbane 315 Brunswick St, Brisbane, Queensland AU Fraud Report Q1 2020